Method and system for authentication by defining a demanded level of security LY Gomez, I Thomas US Patent 8,490,154, 2013 | 92 | 2013 |
Differentially private generative adversarial networks for time series, continuous, and discrete open data L Frigerio, AS de Oliveira, L Gomez, P Duverger ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International …, 2019 | 84 | 2019 |
ontext-aware security and secure context-awareness in ubiquitous computing environments K Wrona, L Gomez Annales Universitatis Mariae Curie-Sklodowska, sectio AI–Informatica 4 (1 …, 2006 | 76 | 2006 |
Secure and trusted in-network data processing in wireless sensor networks: a survey A Sorniotti, L Gomez, K Wrona, L Odorico Journal of Information Assurance and Security 2 (3), 189-199, 2007 | 63 | 2007 |
Client authentication using a challenge provider R Kilian-Kehr, J Haller, L Gomez, C Hebert US Patent 7,673,141, 2010 | 53 | 2010 |
Enterprise secure messaging architecture J Haller, L Gomez, J Posegga US Patent 7,272,716, 2007 | 49 | 2007 |
Method and system for automatically organizing and achieving a pre-given task by means of robot functionalities C Ulmer, L Gomez, F Montagut, C Hebert, K Wrona US Patent 8,548,627, 2013 | 37 | 2013 |
Password protection using personal information L Gomez, S Trabelsi, A Mouelhi US Patent 8,539,599, 2013 | 37 | 2013 |
Method and system for access control using resource filters L Gomez, A Laube US Patent 8,156,537, 2012 | 35 | 2012 |
Design guidelines for integration of wireless sensor networks with enterprise systems L Gomez, A Laube, A Sorniotti 1st International ICST Conference on Mobile Wireless Middleware, Operating …, 2010 | 34 | 2010 |
Trustworthiness assessment of wireless sensor data for business applications L Gomez, A Laube, A Sorniotti 2009 international conference on advanced information networking and …, 2009 | 34 | 2009 |
Penetration test attack tree generator C Hebert, L Gomez US Patent 9,894,090, 2018 | 33 | 2018 |
System and method for inhibiting interaction with malicious software LLY Gomez, CRJ Hebert, CSP Ulmer US Patent 7,587,676, 2009 | 28 | 2009 |
Method and a system for secure execution of workflow tasks in a distributed workflow management system within a decentralized network system F Montagut, L Gomez, C Hebert, C Ulmer US Patent 9,047,490, 2015 | 27 | 2015 |
Context-aware based cryptography LY Gomez US Patent 8,687,805, 2014 | 26 | 2014 |
Security patterns for capturing encryption-based access control to sensor data A Cuevas, P El Khoury, L Gomez, A Laube 2008 Second International Conference on Emerging Security Information …, 2008 | 26 | 2008 |
Tracing of collaborative workflows CRJ Hebert, LY Gomez, F Montagut, H Plate, CSP Ulmer US Patent 8,819,131, 2014 | 25 | 2014 |
Efficient access control for wireless sensor data A Sorniotti, R Molva, L Gomez, C Trefois, A Laube, P Scaglioso International Journal of Wireless Information Networks 16, 165-174, 2009 | 25 | 2009 |
Context-aware security policy for the service discovery S Trabelsi, L Gomez, Y Roudier 21st International Conference on Advanced Information Networking and …, 2007 | 24 | 2007 |
Trustworthiness assessment of sensor data processing L Gomez, C Hébert, A Sorniotti, C Ulmer US Patent 8,775,127, 2014 | 22 | 2014 |